tag:blogger.com,1999:blog-66584242009-06-16T11:15:42.475-07:00The Security MentorAdvice for normal people about computer and information security from Beryllium Sphere(R) LLCFrederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.comBlogger994125tag:blogger.com,1999:blog-6658424.post-56270919482112754172009-06-16T11:09:00.000-07:002009-06-16T11:15:42.483-07:00Don't worry yet about the iPhone newsWhat do the scary headlines about the latest iPhone security issue mean for you?<br /><br />Not much.<br /><br />There are several obstacles in the way of taking over an iPhone remotely. What security researchers discovered is a way past one of those obstacles, but not a way to take over an iPhone.<br /><br />Right now the prudent thing to do is stay current with software updates and not worry until something else goes wrong.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-5627091948211275417?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-46686515605696627372009-06-13T18:17:00.001-07:002009-06-13T18:22:44.279-07:00What do criminals want with your PC, anyway?I like Brian Krebs's security column in the Washington Post, and he wrote a good one a while back about <a href="http://voices.washingtonpost.com/securityfix/2009/05/the_scrap_value_of_a_hacked_pc.html">criminal uses for a compromised home computer</a>.<br /><br />There are dozens of ways your computer could be misused, some of them quite embarrassing. For example, there's a scam in which the intruder sends email in your name to everyone in your address book claiming to be stranded overseas and in desperate need of having money wired. Then the criminal picks up the wired funds, and Western Union transfers are irreversible.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-4668651560569662737?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-9609078619028548822009-06-13T18:14:00.000-07:002009-06-13T18:16:44.470-07:00I'm back!For a long time it seemed like there was nothing new to say, but lately I've been finding things I'd like to pass along.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-960907861902854882?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.comtag:blogger.com,1999:blog-6658424.post-86728607591252030872009-01-16T20:56:00.000-08:002009-01-16T21:35:55.912-08:00How to protect your children onlineStep one is to know what the dangers are, and sensational TV shows turn out to be a bad guide.<br /><br />A large government-industry-academic team has released a report on <a href="http://cyber.law.harvard.edu/pubrelease/isttf/">dangers to minors online and especially at social networking sites</a>.<br /><br />You can figure out just about all their conclusions in advance by just thinking about the fact that social networking sites have people on them who do people-type things.<br /><br />With that thought in mind, you won't be surprised by <blockquote>Bullying and harassment, most often by peers, are the most frequent threats that minors face, both online and offline. <br /></blockquote> or by <blockquote>Social network sites are not the most common space for solicitation and unwanted exposure to problematic content, but are frequently used in peer-to-peer harassment, most likely <br />because they are broadly adopted by minors and are used primarily to reinforce pre-existing social relations. <br /></blockquote> or by <blockquote>Minors are not equally at risk online. Those who are most at risk often engage in risky behaviors and have difficulties in other parts of their lives. The psychosocial makeup of <br />and family dynamics surrounding particular minors are better predictors of risk than the use of specific media or technologies. <br /></blockquote><br />One member of the task force maintains a database of sex offenders, and even he said <a href="http://www.nytimes.com/2009/01/14/technology/internet/14cyberweb.html">"This shows that social networks are not these horribly bad neighborhoods on the Internet ...Social networks are very much like real-world communities that are comprised mostly of good people who are there for the right reasons."</a>.<br /><br />So teach your children to take the same precautions they would in the offline world.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-8672860759125203087?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.comtag:blogger.com,1999:blog-6658424.post-56907877085070014262009-01-16T19:56:00.000-08:002009-01-16T20:09:51.471-08:00Things to know about the "Conficker" or "Downadup" wormThe extensive publicity about this piece of malware, which has infected millions of Windows PCs, usually leaves out some things you'd want to know.<br /><br />For example, you might wonder how to tell if you've been infected. Symptoms include being locked out of accounts, being unable to connect to the websites of security companies, and some more <a href="http://www.mycert.org.my/en/services/advisories/mycert/2009/main/detail/626/index.html">technical symptoms</a>.<br /><br />Or you might wonder what to do if you are already infected. That's a problem because the worm tries to defend itself against antivirus software. The latest edition of <a href="http://support.microsoft.com/kb/890830/">Microsoft's Malicious Software Removal Tool</a> is said to be able to delete the worm.<br /><br />As for protecting yourself, you're safe if you've been taking normal precautions. It won't go through a firewall, and it can only spread to computers that aren't up to date on Microsoft's security fixes.<br /><br />In fact, if you'll pardon me a little flame, the fact is that Microsoft released a fix that protects against this worm back in October. They even made it one of their emergency unscheduled patches. When they do that they really mean it. Some companies do need to delay installing patches while they test them for compatibility, but come on, three months? And for home users I recommend turning on automatic updates.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-5690787708507001426?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.comtag:blogger.com,1999:blog-6658424.post-74322080771912258552008-11-24T20:18:00.000-08:002008-11-24T20:37:53.275-08:00What does the latest attack on WiFi mean to you?The headlines were scary, talking about WiFi security being broken. How bad is it?<br /><br />Not very. The new attack, clever though it is, doesn't allow someone to get onto your network or to read any of your data. It's important, because it means the security mechanisms weren't doing what they were supposed to, but it's not an operational concern yet.<br /><br />If you like to stay ahead of the game, you can always poke through your wireless settings and make sure you're not using "TKIP", but you'll be OK if you don't.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-7432208077191225855?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-60141800890648402752008-11-24T19:40:00.000-08:002008-11-24T19:47:55.028-08:00Reading PDFs can be dangerousAdobe has patched multiple problems in their software and browser plugin for reading .PDF documents. You want to be running version 9, which fixes all the problems I've heard of.<br /><br /><a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&taxonomyName=Security&articleId=9119038&taxonomyId=17&pageNumber=1">ComputerWorld article</a><br /><a href="http://www.foxitsoftware.com/pdf/rd_intro.php">A smaller, faster PDF reader with fewer and faster-patched security holes</a><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-6014180089064840275?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-26190556915420797242008-11-24T18:39:00.000-08:002008-11-24T19:35:11.704-08:00Voting machines roundupHere are some more <a href="http://www.cs.ucsb.edu/~seclab/projects/voting/">university studies of voting machine security</a>. The key quote, more important than the fact that they demonstrated a virus copying itself from one voting machine to another and therefore making it possible to compromise several machines by infecting just one, is <blockquote>While most critical systems are continuously scrutinized and evaluated for safety and correctness, electronic voting systems are not subject to the same level of scrutiny. A number of recent studies have shown that most (if not all) of the electronic voting systems being used today are fatally flawed, and that their quality does not match the importance of the task that they are supposed to carry out.</blockquote>.<br /><br />The <a href="http://www.iht.com/articles/2008/11/05/america/05vote.php?page=1">2008 election went mostly OK</a>, with only scattered reports of problems. <a href="http://broadcast.oreilly.com/2008/11/a-2008-e-voting-wrapup-with-dr.html">Dr. Barbara Simons of the Federal Election Advisory Council still advocates manual audits</a>, pointing to apparent problems that have come up even with optical-scan systems. Her interview is long but well worth the read. <a href="http://www.electiondefensealliance.org/2008_Exit_Poll_Discrepancies">Activists worry that there were again discrepancies between exit poll results and the ballot counts</a>, but I don't see how they can rule out bias in the exit polls (one Democratic analyst pointed out that young people are more likely to talk to exit pollers than older people are, and this time there was a big difference between the youth vote and the elderly vote).<br /><br />Touch screen machines lost ground in this election, especially in the swing states of Ohio and Florida. They were still being used in West Virginia: people in multiple counties there reported their <a href="http://wvgazette.com/News/200810180380">votes being flipped from the candidate they picked to the other one</a>, but that's more likely to be the result of an out-of-alignment touch screen than anything else.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-2619055691542079724?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-18970429968564180712008-10-24T20:54:00.000-07:002008-10-24T21:03:35.522-07:00Comments on the news, this one's NOT overblownRun Windows Update.<br /><br />Microsoft released a "Critical" security patch to fix a problem in which any computer running Windows file sharing can be completely taken over with no action on your part.<br /><br />It's less of a worry if you're running Vista, and normal firewalling will stop the attack. But it's still a big concern.<br /><br />When the news broke, I advised clients that before long there would be automated attack programs that unskilled attackers could use, and that attackers would use the new attack to spread infections after getting a toehold by other means.<br /><br />Both have already happened. There's already a self-reproducing "worm" program taking advantage of the security weakness. It's being introduced behind people's firewalls by the usual sort of trickery, but then once it's on one machine it copies itself to the others on the network.<br /><br />It's a little more complicated than that, but now you have the gist.<br /><br />If you use a laptop on the road, make sure you've got a firewall program running on it and that it's set to block Windows file sharing, or turn off file sharing altogether in the Control Panel.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-1897042996856418071?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-13146106692540129312008-10-24T20:41:00.000-07:002008-10-24T20:54:43.410-07:00Comments on the news: this is overblownThe headlines said that wireless networking security is now a thing of the past, due to a clever company finding a way to program graphics cards to crack security codes.<br /><br />In a word, no.<br /><br />What they did was speed up existing password-guessing attacks on one flavor of Wi-Fi security, by a factor of 25-100. If you've chosen a good password in the first place, it's not going to be so close to guessable that it matters if someone can guess 25 times faster.<br /><br />And you can really go to town picking a hard password for your Wi-Fi setup, because you only have to type it in when you're installing things. You can use something long and obscure. You can make it up to 63 characters long!<br /><br />I recommend a passphrase, something with multiple words instead of an incomprehensible set of letters and numbers. Visit http://www.diceware.com for a system that lets you roll dice to pick short words from a big list. As long as you've chosen them randomly, a passphrase with as few as four words will defy any feasible attack.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-1314610669254012931?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.comtag:blogger.com,1999:blog-6658424.post-72206972796831331792008-09-06T16:21:00.000-07:002008-09-06T16:27:18.926-07:00But are voting machines really dangerous in practice?Spokesmen for the voting machine manufacturers like to say that the reported vulnerabilities are unrealistic in the context of an actual election, with all its tests and security procedures.<br /><br />This is plausible. There are lots of cases in security work where it's OK to work around a problem with a cross-check instead of eliminating the problem altogether.<br /><br />Are they right?<br /><br /><a href="http://www.freedom-to-tinker.com/?p=1304">Princeton researcher Dan Wallach rebuts vendor claims in detail</a>. He explains how an attacker or a corrupt official could do the same things his team did, and throw an election without getting caught.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-7220697279683133179?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-7094589041011550772008-09-06T15:57:00.000-07:002008-09-06T16:08:48.779-07:00View your online banking records without your passwordThis is a good example of how a simple feature change can create a security issue, and why security features that seem unnecessary can be important in practice.<br /><br />Google's Chrome browser has a feature I've dreamed of for a long time. You can search the text of pages you've visited before. If you remember that you looked at a great recipe using arugula but can't remember where you found it, you can type "arugula" into Chrome's do-everything bar and it will find the page in your history with the word "arugula" in it. Nifty. Useful.<br /><br />OK, but what about your online banking activity? It turns out that if you search for words like "balance" or "Visa" you'll bring up copies of pages that your online bank showed you, with potentially sensitive information on them. <a href="http://www.tgdaily.com/content/view/39176/108/">Humphrey Cheung reports on Chrome indexing banking records</a>. You can't transfer money or anything like that, but it's an information leak.<br /><br />If you want your banking activity to be confidential from other users of your computer, there is an answer. Use Chrome's "incognito" window, which turns off storing pages into your history. This is a good idea for any security-sensitive activity.<br /><br />Also, <a href="http://coderrr.wordpress.com/2008/09/03/google-chrome-privacy-worse-than-you-think/">turn off Chrome's autosuggest feature if you don't want Google to know everything you type into the do-everything bar</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-709458904101155077?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-51052347394437425292008-09-05T17:13:00.000-07:002008-09-05T20:11:43.388-07:00Alarming security bug in Google ChromeSome security experts, whose names I can't find offhand, have discovered a bug in Google's new "Chrome" browser that could sidestep all of Chrome's security measures and take over your computer.<br /><br />The good news is that it can only happen while you're saving a web page, there's no evidence of bad guys trying this in the wild, and it's unlikely that they will given how few Chrome installations there are.<br /><br />What's alarming is that it's a kind of bug ("stack based buffer overflow") that can usually be avoided by checking a program with well-known tools, and which can usually be blocked from taking over your computer if the programmers use appropriate options when they translate the program from a human-readable computer language into an executable program.<br /><br />Without the details, it's impossible to tell whether this is just the kind of accident that could happen to anybody, or whether Google has been overlooking precautions that should be standard procedure these days. If the latter, we'll know because there will be a flood of security bug reports in short order.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-5105234739443742529?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-4998382891745196332008-09-04T20:42:00.000-07:002008-09-04T20:54:51.615-07:00More thoughts about Google ChromeChrome will save passwords for you, but unlike Firefox it doesn't let you define a master password that protects all your stored website passwords. <br /><br />This could be OK. I worry about future occurrences of a problem that happened in 2006, in which malicious code could put up a login form and fool a browser into entering a saved password silently without asking you first. With a master password in place, you'd get a reminder that your browser was about to retrieve and send a password. A master password also makes password storage more secure.<br /><br />I've been reluctantly coming to the conclusion that the <a href="https://addons.mozilla.org/en-US/firefox/addon/10">AdBlock</a> Firefox extension is a security measure. Bad guys have figured out that they can expose zillions of people to malicious code by putting that code into an ad. Don't expect to see anything like AdBlock for a browser that comes from an advertising company.<br /><br />My other favorite way to reduce my exposure, which is to minimize the number of pages I allow to run Javascript, isn't likely to find a home in Chrome. One of Chrome's main design goals is to have a better, stronger, faster Javascript engine. <br /><br />This could all work out OK. Google has taken steps to limit the harm that web-based malware can do to you. If Google's paid enough attention in the right places, they might be producing a browser with fewer security bugs for bad web pages to exploit.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-499838289174519633?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-42493066175681261292008-09-03T10:31:00.001-07:002008-09-03T10:34:49.619-07:00Latest word about Google's "Chrome" browserSomeone's already found the first security bug! It was a researcher named Aviv Raff, and it's not a biggy, but it sure is embarrassing. It's a bug in code that Google reused for their browser, that had already gotten fixed elsewhere. It allows a bad site to fill up your desktop with icons for potentially unwanted software. <br /><br />Chrome will be both good and bad for your privacy. It has a mode where it stops logging your history on your local machine. On the other hand, and Google is commendably up-front about this, in order to generate suggested sites and searches, it's constantly sending information about every place you visit to Google. You can turn this off, but how many people will?<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-4249306617568126129?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-58336494937351328542008-09-01T23:32:00.000-07:002008-09-01T23:48:42.889-07:00What you're up againstA software developer's blog has an example of a <a href="http://www.codinghorror.com/blog/archives/001164.html">malicious web page displaying fake buttons and controls that look like part of Windows</a> to trick you into downloading what they claim is an antivirus program.<br /><br />It all started from a legitimate web site, too, which apparently got taken over somehow by scammers.<br /><br />I'm not completely happy with the suggestions the blogger and the people in the comments had to offer. They suggest changing the way your real Windows interface looks so that imitations will look strange. Instead I'd suggest NoScript, which would have halted the example attack in its tracks, and one other thing. The point of all the deception was to trick you into downloading an executable file. You get a real warning at that point, which asks if you really want to save and run a file from the Internet. Say "no" to those unless you set out to download something that you have some reason to trust.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-5833649493735132854?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-72485649736259078822008-09-01T23:14:00.000-07:002008-09-01T23:29:49.223-07:00First reaction to Google's browser announcementGoogle accidentally pre-announced a <a href="http://books.google.com/books?id=8UsqHohwwVYC&printsec=frontcover#PPA1,M1">Google-brand web browser</a>. It's not available to try out yet. <br /><br />It's going to do some encouraging things about security. Google plans to "sandbox" the web applications running in their new browser, so that even if/when you browse to a malicious page it won't be able to do widespread damage to your computer. If I'm reading their claims correctly, they say they can stop keystroke loggers from working (not sure how that's possible).<br /><br />Popups will be tied to the tab they came from and can't cover up other tabs.<br /><br />There will be a few problems to watch out for, and things they can't possibly prevent and still be useful. The big issue is that they want their browser to be a place where sophisticated web apps can run. That means the browser has to be able to do all the sophisticated things the web app is supposed to do. Google tries to make sure the browser can't overwrite things on your hard disk, but by definition it has to be able to overwrite your Google Docs.<br /><br />"Sandboxes" have been used before. What usually happens is that when they're new, clever people find a few ways that bad code can escape from them and do bad things that the sandbox was supposed to prevent. Then after a little while the holes in the sandbox get fixed and it works as designed.<br /><br />Plugins are the area most likely to cause security problems for Google's browser. Plugins like Flash are designed to do a wide range of things, wider than the browser's normal security policy would permit. Plugins like Flash have had security problems time and again.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-7248564973625907882?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-73598334987180725152008-09-01T22:48:00.000-07:002008-09-01T23:11:59.965-07:00How to recognize an attackI ran into a suspicious web page the other day.<br /><br />It opened from an unrelated search result. That's not a sign of a legitimate web page. What really gave it away was that it claimed to offer an antivirus product. Legitimate companies do legitimate advertising. If you see something unexpected suddenly offering you security software, be suspicious: it's like someone walking into your store off the street and offering you "protection".<br /><br />A really good scam would have shown a web page that looked like a real business. This one didn't even have that much, not that there was any way to trust it at that point.<br /><br />I looked at the page's inner workings briefly. It looked like it was set up to display all kinds of scary warnings and trick me into downloading a program from them. I didn't even see the scary fake warnings, because I'm running the <a href="https://addons.mozilla.org/en-US/firefox/addon/722">NoScript</a> extension to <a href="http://www.mozilla.com/en-US/firefox/?from=getfirefox">Firefox</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-7359833498718072515?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-70698584115412725882008-08-30T23:13:00.000-07:002008-08-30T23:15:36.212-07:00Rent "Hacking Democracy", the 2006 HBO documentaryIt's a good introduction for a non-specialist. It leaves some things out, and I spotted one really minor error, but it's worth your time.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-7069858411541272588?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-47661443716515776622008-08-29T18:35:00.000-07:002008-08-29T18:48:21.223-07:00If you have nothing to hide, you have nothing to fear?A three-year-old in Dorset, England, is having trouble sleeping at night. She's afraid there's a man outside watching her.<br /><br />There's a reason. Government employees were following her family to and from school for three weeks, making records such as "female and three children enter target vehicle and drive off" and "curtains open and all lights on in premises".<br /><br />But, we are told, we have to trade some privacy for security. Let's take a look at the public safety implications, and see if they justify following kids to school and scaring a three-year-old.<br /><br />The surveillance was to assess whether the family really lived in the coverage area of the school they applied to. (They did, by the way).<br /><br /><a href="http://www.guardian.co.uk/society/2008/apr/11/localgovernment.ukcrime">The Poole borough spying case</a>.<br /><br />Ask tough questions if your government tells you they need to invade your privacy in the name of security.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-4766144371651577662?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-19931586502343378112008-08-29T18:12:00.000-07:002008-08-29T18:22:29.462-07:00"[T]he case could be treated as terrorism"Gary McKinnon admits that he went into US government computers without permission. <br /><br />He was sitting at home in his bathrobe looking around for evidence that the US government had secret alien technology taken from UFOs.<br /><br />He got into many machines, working alone and without being particularly sophisticated. If you're a US taxpayer, take that as a sign that the computers you're paying for are being badly administered. If a computer is important enough to prosecute someone over, it's important enough to protect well enough that a random eccentric can't get in.<br /><br /><a href="http://news.bbc.co.uk/1/hi/technology/4715612.stm">BBC profile of Gary McKinnon</a><br /><a href="http://news.bbc.co.uk/2/hi/uk_news/7585861.stm">The authorities have warned that without his co-operation and a guilty plea the case could be treated as terrorism and he could face a long jail sentence. "</a><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-1993158650234337811?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-54735436523840858572008-08-29T16:47:00.000-07:002008-08-29T17:08:13.501-07:00How are voting machines tested?I've written before about the <a href="http://www.berylliumsphere.com/security_mentor/2004/08/are-voting-machines-honest-thats.html">limitations on the "certification" of voting machines</a>.<br /><br />There's been more talk about it recently. <a href="http://www.wired.com/politics/security/news/2004/11/65535?currentPage=1">Wired magazine's criticism of voting machine testing</a> notes that problems go years without being fixed, and that the testing consists of going down a checklist that often has nothing to do with reliability or security. Worse, the software running in your election may be different from the software that got certified. <a href="http://www.cs.uiowa.edu/~jones/voting/testing.shtml">University of Iowa computer science professor Douglas Jones proposes testing procedures for voting machines</a> including election-day tests aimed at catching malicious software that gives the right answers until it sees it's in a real election.<br /><br />Nobody in those discussions mentions a key point. If you could make software reliable by testing it, we'd see a lot fewer bugs in our daily live. Security is even harder to test for than reliability. A program can run just fine and be insecure.<br /><br />The way to get secure software is to start at the design stage and build it from the ground up to resist or detect attack. For example, the software that adds up the vote totals from the precincts shouldn't allow the machine operator to change the totals without even creating a record of the change. One widely used design did allow that.<br /><br />The next step in improving software security is to let qualified people, lots of them, look for hidden flaws. That includes cryptographers, but also the kinds of sideways-thinking people who like solving puzzles and doing things that are supposed to be impossible.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-5473543652384085857?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-64249655792617212082008-08-29T00:55:00.000-07:002008-08-29T01:03:19.887-07:00Security can backfire<a href="http://abcnews.go.com/Blotter/Story?id=5624381&page=1">TSA inspector damages multiple aircraft</a>.<br /><br />Mechanics caught the problem in time. The part damaged was important enough that flights had to be delayed while it was fixed. <br /><br />One aviation industry newsletter had a truly <a href="http://www.aero-news.net/news/commair.cfm?ContentBlockID=340a79d6-839a-470d-b662-944325cea23d&Dynamic=1">sulfurous comment</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-6424965579261721208?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-12973506954063870772008-08-29T00:43:00.000-07:002008-08-29T00:49:20.849-07:00Privacy and "I've got nothing to hide"Earlier this month, the news came out that <a href="http://sundayherald.com/news/heraldnews/display.var.2432225.0.0.php">Best Western exposed the records of 8 million customers</a>. <br /><br />The information that got out included credit card numbers, which are of obvious interest to criminals, and maybe worse, information about future bookings. That's right, it's possible that crooks now know when people are going to be out of town and where they live.<br /><br />Privacy contributes to safety and the rule of law.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-1297350695406387077?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0tag:blogger.com,1999:blog-6658424.post-72711693768957175202008-08-29T00:15:00.000-07:002008-08-29T00:25:03.950-07:00Voting machines! Again!<a href="http://dispatch.com/live/content/local_news/stories/2008/08/21/voting_machines.html?sid=101">Premier Election Solutions (formerly Diebold) machines in Ohio fail to count votes</a>. As far as anyone knows it's just a normal bug.<br /><br />Premier Election Solutions started off by blaming the problem on a conflict with anti-virus software. I was trying to find a way to explain why that sounds wrong to a security person, but someone beat me to it. <a href="http://xkcd.com/463/">My favorite nerdy cartoon about antivirus on voting machines</a>.<br /><br />It's a bad sign when a system has a bug that mission-critical that didn't get caught in testing. Ohio's Secretary of State is suing.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/6658424-7271169376895717520?l=www.berylliumsphere.com%2Fsecurity_mentor%2Findex.html'/></div>Frederickhttp://www.blogger.com/profile/11068504259286732559noreply@blogger.com0